Skip to main content

投资人开始正式看空中国了

发信人: shifting (反思己过), 信区: PhotoGear
标  题: 投资人开始正式看空中国了
发信站: BBS 未名空间站 (Mon Nov 21 09:22:01 2011, 美东)

10月份的数据,外币净流出为将近25个billion的人民币,如果刨除10月份中国政府增
持的外汇储备,则capital的净流出为132个billion。除了在金融海啸来袭的2007年末
,外资净流出的事情在中国几乎从来没有发生过。

我估计原因有三。一个是全球经济不确定性增加,很多投资人撤资自救。但是这个其实
很不靠谱,因为那里赚的钱都能用来救火。再一个是人民币升值预期消失,套利动机也
因此而不复存在,所有热钱必然连夜出逃。最近温家宝也在强调汇率双向浮动,暗示人
民币有可能贬值。最后一个,我觉得也是最根本的,是境外投资人看空中国经济增长前
景。也就是说,中国有人口红利所带来的经济高速增长荣景已经结束了,而接下来中国
的政府和老百姓要花很大的精力来医治由于粗放型的增长所带来的种种疾患,连铁公鸡
拉增长这一招都已经用到尽头,除了统计局,再也没有人有本事来帮中国政府把GDP游
戏继续玩下去了。

接下来会发生什么?中国政府的当务之急是两件事,稳定中国的金融体系和资本市场,结
束抽风式的金融货币政策,如若不然贻害无穷。然后就是减税救助中国的中小民营企业
,结束杀鸡取卵式的税收政策,为中国经济的长期稳定发展奠定一个基础,不要再保8
保9了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...